Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
qpX2kudgQm.exe

Overview

General Information

Sample name:qpX2kudgQm.exe
renamed because original name is a hash value
Original sample name:ac4426f3561ec3201a8992dd7d3b32fb.bin.exe
Analysis ID:1430681
MD5:ac4426f3561ec3201a8992dd7d3b32fb
SHA1:77277d3713050c72375e2a9e729d181ccf6cf743
SHA256:5048ad9700511dde2600bc9374c21e821f4714251c5e8ce4d530858024223f1d
Tags:exeprg
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Detected potential crypto function
Entry point lies outside standard sections
One or more processes crash
PE file contains sections with non-standard names
PE file does not import any functions
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

  • System is w10x64
  • qpX2kudgQm.exe (PID: 6748 cmdline: "C:\Users\user\Desktop\qpX2kudgQm.exe" MD5: AC4426F3561EC3201A8992DD7D3B32FB)
    • WerFault.exe (PID: 6432 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6748 -s 240 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: qpX2kudgQm.exeAvira: detected
Source: qpX2kudgQm.exeReversingLabs: Detection: 78%
Source: qpX2kudgQm.exeVirustotal: Detection: 69%Perma Link
Source: qpX2kudgQm.exeJoe Sandbox ML: detected
Source: qpX2kudgQm.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: Amcache.hve.3.drString found in binary or memory: http://upx.sf.net
Source: C:\Users\user\Desktop\qpX2kudgQm.exeCode function: 0_2_0040A91A0_2_0040A91A
Source: C:\Users\user\Desktop\qpX2kudgQm.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6748 -s 240
Source: qpX2kudgQm.exeStatic PE information: No import functions for PE file found
Source: qpX2kudgQm.exe, 00000000.00000002.1744074335.0000000000426000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename'JLJN1H, vs qpX2kudgQm.exe
Source: qpX2kudgQm.exeBinary or memory string: OriginalFilename'JLJN1H, vs qpX2kudgQm.exe
Source: qpX2kudgQm.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal60.winEXE@2/5@0/0
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6748
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\61149550-0d0c-46c5-8fd5-e8964be4c726Jump to behavior
Source: C:\Users\user\Desktop\qpX2kudgQm.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: qpX2kudgQm.exeReversingLabs: Detection: 78%
Source: qpX2kudgQm.exeVirustotal: Detection: 69%
Source: unknownProcess created: C:\Users\user\Desktop\qpX2kudgQm.exe "C:\Users\user\Desktop\qpX2kudgQm.exe"
Source: C:\Users\user\Desktop\qpX2kudgQm.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6748 -s 240
Source: C:\Users\user\Desktop\qpX2kudgQm.exeSection loaded: apphelp.dllJump to behavior
Source: initial sampleStatic PE information: section where entry point is pointing to: .fgr
Source: qpX2kudgQm.exeStatic PE information: section name: .vej
Source: qpX2kudgQm.exeStatic PE information: section name: .fgr
Source: qpX2kudgQm.exeStatic PE information: section name: .tmd
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: Amcache.hve.3.drBinary or memory string: VMware
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.3.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.3.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.3.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.3.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.3.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.3.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.3.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.3.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.3.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.3.drBinary or memory string: vmci.sys
Source: Amcache.hve.3.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.3.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.3.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.3.drBinary or memory string: VMware20,1
Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.3.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.3.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.3.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.3.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.3.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.3.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.3.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\qpX2kudgQm.exeProcess queried: DebugPortJump to behavior
Source: Amcache.hve.3.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping21
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
qpX2kudgQm.exe79%ReversingLabsWin32.Trojan.Zeus
qpX2kudgQm.exe69%VirustotalBrowse
qpX2kudgQm.exe100%AviraTR/Crypt.XPACK.Gen
qpX2kudgQm.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.netAmcache.hve.3.drfalse
    high
    No contacted IP infos
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1430681
    Start date and time:2024-04-24 02:45:09 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 3m 57s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:8
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:qpX2kudgQm.exe
    renamed because original name is a hash value
    Original Sample Name:ac4426f3561ec3201a8992dd7d3b32fb.bin.exe
    Detection:MAL
    Classification:mal60.winEXE@2/5@0/0
    EGA Information:Failed
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 0
    • Number of non-executed functions: 5
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 52.168.117.173
    • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
    • Execution Graph export aborted for target qpX2kudgQm.exe, PID 6748 because there are no executed function
    • Not all processes where analyzed, report is missing behavior information
    TimeTypeDescription
    02:46:06API Interceptor1x Sleep call for process: WerFault.exe modified
    No context
    No context
    No context
    No context
    No context
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):65536
    Entropy (8bit):0.6333872022710899
    Encrypted:false
    SSDEEP:96:2iBFRDls3hY179fSQXIDcQvc6QcEVcw3cE/f+HbHg6ZAX/d5FMT2SlPkpXmTAqfZ:rPlb0BU/4jEzuiFYZ24IO8H
    MD5:A11ABF17E8E9DAFFB19701ED223F5C44
    SHA1:5DF46340ABFEE500939F79466C87556C76A5DB2C
    SHA-256:5F579013CDC2DA4E34B5DCF0F3A6F76B95AC9A9BEBC3C818A8BDC3D215F760BF
    SHA-512:23401396CF9F678C51DF061E990561B6AC4271C8F109F859E132EA73AFE84C1302731D6A6FFEBFB39AEDF124D308CFDC1D019D6B2AFD6E6C1E77708A7A1976E5
    Malicious:false
    Reputation:low
    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.8.3.9.3.1.5.6.7.8.4.9.7.7.3.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.8.3.9.3.1.5.7.0.9.7.4.4.3.0.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.c.e.e.9.7.d.8.-.e.2.0.6.-.4.8.2.1.-.b.6.f.8.-.8.2.5.a.d.8.6.e.9.0.8.2.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.6.6.7.6.2.7.b.-.a.e.2.e.-.4.1.0.5.-.9.d.1.5.-.7.0.2.d.3.a.c.f.7.c.1.2.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.q.p.X.2.k.u.d.g.Q.m...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.a.5.c.-.0.0.0.1.-.0.0.1.4.-.9.b.a.0.-.9.3.c.4.e.0.9.5.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.c.e.3.1.0.3.7.f.8.4.4.e.0.8.8.2.7.d.e.7.2.c.b.e.9.e.e.d.d.6.1.4.0.0.0.0.f.f.f.f.!.0.0.0.0.7.7.2.7.7.d.3.7.1.3.0.5.0.c.7.2.3.7.5.e.2.a.9.e.7.2.9.d.1.8.1.c.c.f.6.c.f.7.4.3.!.q.p.X.2.k.u.d.g.Q.m...e.x.e.....T.a.r.g.e.t.A.p.p.
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Mini DuMP crash report, 14 streams, Wed Apr 24 00:45:56 2024, 0x1205a4 type
    Category:dropped
    Size (bytes):18760
    Entropy (8bit):1.9841907930004488
    Encrypted:false
    SSDEEP:96:5/8JE3IB6CQRgUM4i7nuxJeWEvGtjgvFDFLjEaGctWzwBUWIkWI/sI4w8uqqy:SP4YUOuKWElDFLjETY+Usw8Dqy
    MD5:D153AEFDEBD51911555A074F0A2865C7
    SHA1:99C2559B571E32D9DEDD38F49CBB540CF3438923
    SHA-256:AC4FA7C15C9B30D244C8184A8264C730A8740DDC5746B28B4FB40ACE9B80871B
    SHA-512:F9E6D3DE4132749F24297623FAF2CC212998AD088B52C3C4651F509B311148FDB3C3338D0B7E1E25B10901A5BACEEF3216169220EE98E403973C040AF29E1794
    Malicious:false
    Reputation:low
    Preview:MDMP..a..... .......DV(f............4...............<.......d...............T.......8...........T................?......................................................................................................eJ......L.......GenuineIntel............T.......\...DV(f.............................0..2...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):8284
    Entropy (8bit):3.6945450631268435
    Encrypted:false
    SSDEEP:192:R6l7wVeJ+W6bf6Y9NSU9zqgmfBXprB89bmzsfIim:R6lXJ36bf6YXSU9zqgmfB0mYf8
    MD5:1089E43678509B06193CDC334302792E
    SHA1:47D6616E697E6220ED7C70F2BD9857EF298D4780
    SHA-256:5F10F0D2319730032D0791382E3CD714241A3ABE323C4FE17D3CD561A377309B
    SHA-512:EDE165D7197212B8825CEFB0D660FA886537AB7198ECF349712A686579E9946651383D15C8DD3AB4E9BFBD74B8C263E3BE71A2666629248E64DCB33FD5BB8A09
    Malicious:false
    Reputation:low
    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.7.4.8.<./.P.i.
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):4579
    Entropy (8bit):4.461162288415067
    Encrypted:false
    SSDEEP:48:cvIwWl8zsJuJg77aI9WxWpW8VYXYm8M4JLFFA+q86pK4vUtYd:uIjfJkI7gg7VbJs1K4vUtYd
    MD5:89249BB67E33ABFCEA345B169DFFC20B
    SHA1:54AD5715ADCFB9954E755E36575E54CCF459BE79
    SHA-256:E50EDBF3276860390002E1A481DD70C0A2469ECE4180EE040E0EF6A0C035DD39
    SHA-512:2DD5A92B2B196FD9E0AA2E7628F4DB41C8A632007759ABA8C535D3FAE47BFF2075CCC4365036915F72B042F109059CAEC4FF4C9D972D66FE92435DABF4D890D8
    Malicious:false
    Reputation:low
    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="293268" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:MS Windows registry file, NT/2000 or above
    Category:dropped
    Size (bytes):1835008
    Entropy (8bit):4.465468189695898
    Encrypted:false
    SSDEEP:6144:ZIXfpi67eLPU9skLmb0b4+WSPKaJG8nAgejZMMhA2gX4WABl0uNvdwBCswSb1:qXD94+WlLZMM6YFHB+1
    MD5:7F2A8F8343B552B7D22225EDFDA281C1
    SHA1:36CAA9D032CF877B4114BDB2C0FF35B0D321B35A
    SHA-256:20192039E3F7E253852D42AA6AD093027637B5AEA997ABBCA108DED2BC033548
    SHA-512:01B32816D10FA0CF05D043A7ADBD8F9D7607E02F82DA4C7EF4921C67F43B10F6E096C23B67EE9407EB5630E9FE83C80663064F1AEF47473436A33F372EFF46DE
    Malicious:false
    Reputation:low
    Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm>...................................................................................................................................................................................................................................................................................................................................................x...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    File type:PE32 executable (GUI) Intel 80386, for MS Windows
    Entropy (8bit):6.700871214659571
    TrID:
    • Win32 Executable (generic) a (10002005/4) 99.96%
    • Generic Win/DOS Executable (2004/3) 0.02%
    • DOS Executable Generic (2002/1) 0.02%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:qpX2kudgQm.exe
    File size:49'664 bytes
    MD5:ac4426f3561ec3201a8992dd7d3b32fb
    SHA1:77277d3713050c72375e2a9e729d181ccf6cf743
    SHA256:5048ad9700511dde2600bc9374c21e821f4714251c5e8ce4d530858024223f1d
    SHA512:6bbdeb507148942fe8ea99f85ecc325da8f459877971e7d69374a888a73ae10a2bb32457a273a81dc40c9ef24e03577a315b21c2e0dec94fa854a755cf987821
    SSDEEP:1536:pXWvuUkqQIs8blBcEnHK26OfJ1G1NNLHzNrv9Iy:aNtblG2PU1NBHRrv9X
    TLSH:8323AF4676E1DFF3DD2E803122957BB61B7EEC310925AD5BC3200BC97862152866BF87
    File Content Preview:MZ......................@...................................X.......sploL.....:.....`...@~..`.......4.......^}f}(@.G.I.S.O.[.b.\L.../..q.z,s....................^}f}(@.._.RKP.|.6..S..D.>..{"-.oF.P.....N...2...V....edg^y(.B.,.fapC.5..nI.kR.._v1......~.H.bmL
    Icon Hash:90cececece8e8eb0
    Entrypoint:0x4112fc
    Entrypoint Section:.fgr
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
    DLL Characteristics:
    Time Stamp:0x3E816D45 [Wed Mar 26 09:05:09 2003 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:5
    OS Version Minor:0
    File Version Major:5
    File Version Minor:0
    Subsystem Version Major:5
    Subsystem Version Minor:0
    Import Hash:
    Instruction
    iretd
    cmp dword ptr [eax+00h], eax
    push eax
    sbb eax, 00000041h
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    loopne 00007F58716F7123h
    inc eax
    add byte ptr [eax], dl
    sbb eax, 10480041h
    inc ecx
    add byte ptr [eax], al
    add byte ptr [eax], al
    add al, dl
    adc dword ptr [eax+00h], eax
    cwde
    sbb al, 41h
    add byte ptr [eax+00004111h], ah
    add byte ptr [eax], al
    add ah, al
    adc dword ptr [eax+00h], eax
    test al, 1Dh
    inc ecx
    add al, dh
    adc dword ptr [ecx+00h], eax
    add byte ptr [eax], al
    add byte ptr [eax], al
    mov ah, 11h
    inc eax
    add byte ptr [eax], ah
    sbb al, 41h
    add byte ptr [eax+00004110h], dh
    add byte ptr [eax], al
    add byte ptr [eax-77FFBFEFh], ch
    sbb eax, dword ptr [ecx+00h]
    push 00004112h
    add byte ptr [eax], al
    add byte ptr [eax+30004011h], bl
    sbb eax, 12F40041h
    inc ecx
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax+eax+01h], al
    add dword ptr [ecx+edi*2+00450040h], ecx
    add dword ptr [ecx], eax
    test al, 79h
    inc eax
    add byte ptr [edx+00h], al
    add dword ptr [ecx], eax
    enter 4079h, 00h
    inc ebx
    add byte ptr [ecx], al
    add esp, esp
    jns 00007F58716F7152h
    add byte ptr [esi+00h], ah
    add byte ptr [eax], al
    add al, 7Ah
    inc eax
    add byte ptr [edi+00h], ah
    add byte ptr [eax], al
    add al, 7Ah
    inc eax
    add byte ptr [ebp+00h], ah
    add dword ptr [ecx], eax
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x130000x1338.tmd
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .vej0x10000xf4d10x9c00a8d0a09adfeacf1926074e704ae3f303False0.6398487580128205data6.743858221295421IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .fgr0x110000x14700x800b44718958d3dd137dd12a8c60c814da2False0.33056640625data3.1749722582639786IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .tmd0x130000x130000x160076bd081f3868b25107bfcbad2c8a6fd6False0.7414772727272727data6.488320603258409IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .rsrc0x260000x10000x40073ba44045a5d40177074d6ca51db87c1False0.392578125data2.719455536601177IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    No network behavior found

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:0
    Start time:02:45:56
    Start date:24/04/2024
    Path:C:\Users\user\Desktop\qpX2kudgQm.exe
    Wow64 process (32bit):true
    Commandline:"C:\Users\user\Desktop\qpX2kudgQm.exe"
    Imagebase:0x400000
    File size:49'664 bytes
    MD5 hash:AC4426F3561EC3201A8992DD7D3B32FB
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Target ID:3
    Start time:02:45:56
    Start date:24/04/2024
    Path:C:\Windows\SysWOW64\WerFault.exe
    Wow64 process (32bit):true
    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6748 -s 240
    Imagebase:0x340000
    File size:483'680 bytes
    MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Reset < >
      Memory Dump Source
      • Source File: 00000000.00000002.1744044141.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1744058690.0000000000411000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1744074335.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1744074335.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_qpX2kudgQm.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: c15c1ee89e93c96ae34e4ef4bd20b42e19debdc84aa94c683d830ec268d23c08
      • Instruction ID: fc6b1c53a0142d53ce8fa4faa6ac3bf358e09cf6d84163a40adb15513231d7ba
      • Opcode Fuzzy Hash: c15c1ee89e93c96ae34e4ef4bd20b42e19debdc84aa94c683d830ec268d23c08
      • Instruction Fuzzy Hash: D181C532E0562ADBDF14CE68C5406ADB7B1EB85324F1642AADD527B3C1C334AD91CBC6
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1744044141.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1744058690.0000000000411000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1744074335.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1744074335.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_qpX2kudgQm.jbxd
      Similarity
      • API ID:
      • String ID: *keep-alive*$/$CONNECT $Connection: $Connection: close$Content-Length: $HTTP/1.0 200 Connection established$Host: $P$Proxy-$Proxy-Connection: $http://
      • API String ID: 0-737691513
      • Opcode ID: 698d137080ba02ccb9cccdc6070b53124ae9485514747d9d3cc63f13aa205724
      • Instruction ID: bb13522f084bb923655411c1ad9593ff2012410c5097fd00fc1f1a6e4451f9ce
      • Opcode Fuzzy Hash: 698d137080ba02ccb9cccdc6070b53124ae9485514747d9d3cc63f13aa205724
      • Instruction Fuzzy Hash: AAD1F071A04306BAEF206B759C4AFAF7AA9AF41314F10447BF601B52E3EB7D8D408759
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1744044141.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1744058690.0000000000411000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1744074335.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1744074335.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_qpX2kudgQm.jbxd
      Similarity
      • API ID:
      • String ID: &i=$&lcp=$&n=$&pr=$&s=$&sp=$&v=
      • API String ID: 0-1780237566
      • Opcode ID: 84f4ac7bcb056f0d8930e4c5fcb93fb568359f6ee0b89a8607adfddcedc8f146
      • Instruction ID: 996a13dee669c886b2ffb44fd7cc0925359650ffb919b3eceeb92c76414f077c
      • Opcode Fuzzy Hash: 84f4ac7bcb056f0d8930e4c5fcb93fb568359f6ee0b89a8607adfddcedc8f146
      • Instruction Fuzzy Hash: B45190B28403557BDB01AFB99C46EFF37ACAB45704F08443AFA10F31A1EA799514877A
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1744044141.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1744058690.0000000000411000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1744074335.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1744074335.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_qpX2kudgQm.jbxd
      Similarity
      • API ID:
      • String ID: login: %spassword: %s$pubring=$qrypto.cfg$quik\login.txt$quik\pubring.txk$quik\secring.txk$secring=
      • API String ID: 0-2831224199
      • Opcode ID: 7cdd71eac5871208c56fc59784c37dd3e796d39d269f893b2605d5b412d64fef
      • Instruction ID: ea94911564e842b23d2d903afa15cf277341123954fda82661bf012b5cbc1ab7
      • Opcode Fuzzy Hash: 7cdd71eac5871208c56fc59784c37dd3e796d39d269f893b2605d5b412d64fef
      • Instruction Fuzzy Hash: 9E5183B1A00209EBCF10AFA5DC45AEE77B8AF44304F1441BBF640B21E0D7385A54CB59
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1744044141.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1744058690.0000000000411000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1744074335.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1744074335.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_qpX2kudgQm.jbxd
      Similarity
      • API ID:
      • String ID: IE Cookies:$PStoreCreateInstance$Z%a$pstorec.dll
      • API String ID: 0-471104514
      • Opcode ID: 004bdf251eccd7c19653b9ed30ede2331283f43840bf7f6879ca2a0442a13aad
      • Instruction ID: 6a7cbb800f284ac3039b943023734149d70441609c3f73e8980f078a3784cb7b
      • Opcode Fuzzy Hash: 004bdf251eccd7c19653b9ed30ede2331283f43840bf7f6879ca2a0442a13aad
      • Instruction Fuzzy Hash: 94C130B1D00209AFDB11DF94C884EEEBBB9FF88304F14846AE605B7291D7399E45CB65
      Uniqueness

      Uniqueness Score: -1.00%